Are verizon.net's email servers vulnerable to the Heartbleed flaw?
If they are, what is Vz doing about it?
I am sure if there were any issues Verizon would have them resolved. You can check many sites via this link: https://filippo.io/Heartbleed/
I would still change my password on a regular basis, and use upper case, lower case, numbers and special symbols.
Also do not save any password if you browser prompts you to.
This may also be worth a view : http://forums.verizon.com/t5/FiOS-Internet/Is-Verizon-s-global-infrastructure-vulnerable-to-Heartble...
I ran a scan of the Verizon log on page using Qualys SSL test page. The results were "A-" KUDOS Verizon.
Here is a link if needed:
FYI that's the web mail server , not the email (SMTP/POP) server. smtp.verizon.net is the outbound email server, and pop.verizon.net is the inbound email server.